Security in industrial environment - Kaspersky Lab · PAGE 1 | Gradient colors 14 149 115 0 121 91...

20
PAGE 1 |

Transcript of Security in industrial environment - Kaspersky Lab · PAGE 1 | Gradient colors 14 149 115 0 121 91...

PAGE 1 |

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

PAGE 2 |

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

There is a huge number of problems of the

critical infrastructures connected with

information security

There is a risk of fatal consequences

associated with the failure of ICS of critical

infrastructures

KL initiated a project to improve the level of

information security in critical infrastructures

Industrial Control System (ICS) – – a security point of view

PAGE 3 |

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

++++

PLC – soft, hardware

Источник: http://www.us-cert.gov/control_systems/practices/documents/Defense_in_Depth_Oct09.pdf

ICS software

Office Soft

ICS protocols People

ICS components – a security point of view

US ICS-CERT (Defense in Depth): Cumulative scheme

1 2 3 PAGE 4 |

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Allen-Bradley: ControlLogix & MicroLogix Schneider Electric: Modicon Quantum General Electric: D20ME Schweitzer: SEL-2032 Koyo: Direct LOGIC H4-ES

Source: http://www.wired.com/threatlevel/2012/01/scada-exploits/

– exist, easily exploited – exist, difficult to exploit – vulnerability not discovered

ICS components – a security point of view

PLC vulnerabilities - Digital Bond research

1 2 3 PAGE 5 |

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

ICS components – a security point of view

Source: http://secunia.com/advisories/search/?search=scada

Software vulnerabilities – Secunia Found: 44 Secunia Security Advisories, displaying 1-25

1 2 3 PAGE 6 |

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

ICS components – a security point of view

Source: http://www.us-cert.gov/control_systems/pdf/ICSA-12-158-01.pdf

Software vulnerabilities – Positive Technologies

1 2 3 PAGE 7 |

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

ICS components – a security point of view

Source: http://www.ida.liu.se/~rtslab/iisw04/camready/SCADA-Attack-Trees-Final.pdf

Protocol vulnerabilities

Most SCADA protocols were designed long before network security perceived to be a problem.

1 2 3 PAGE 8 |

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

ICS components – a security point of view

Personnel “vulnerabilities”

1 2 3 PAGE 9 |

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

ICS components – a security point of view

PLC – soft, hardware ICS software ICS protocols People

PLC – soft, hardware ICS software ICS protocols People

PLC ICS software ICS protocols People

PLC ICS software ICS protocols People

PLC ICS software ICS protocols People Office Soft

PLC – soft, hardware ICS software ICS protocols People Office Soft

US ICS-CERT (Defense in Depth): Cumulative scheme

PAGE 10 | 1 2 3

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

What is the problem?

Since our goal is to improve a secure level of

industrial control system, seems we have a problem

ICS does not have single trusted component at all

problem is very simple:

1 2 3 PAGE 11 |

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Possible solution

Step by step improve all and each system

component to prepare excellent ICS • how much resources do we need to employ?

• how much time do we need?

Do customers want to substitute their working but

non secure systems with trusted one but not proved

it works well?

1 2 3 PAGE 12 |

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Possible solution

Constantly research new vulnerabilities and quickly

offer adequate countermeasures • such an approach requires customers to continuously

update the IT environment

• with such a reactive approach what is the price of a

single unprotected vulnerability?

Are customers willing to jeopardize their systems

with a continuously changing control environment?

1 2 3 PAGE 13 |

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Possible solution

Use simple and trusted unit to monitor all interactions

in regular ICS network • use it as trusted base to build complex trusted systems

Do customers want to improve the security of their

functioning systems without making significant

changes?

1 2 3 PAGE 14 |

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Why KL thinks about secure OS

Simplified scheme of anti-malware battle • bad guys:

1. find vulnerability

2. find a way how to exploit it

• good guys release a method to neutralize it

We always lag behind in this game

To be a leader we have to change game rules

New game rules – new OS

PAGE 15 | 1 2 3

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Secure OS

Now we at Kaspersky Lab have proprietary secure OS

• developed “from scratch”

• developed with “security in mind”

• micro kernel architecture

• highly modular approach

• no direct or uncontrolled communications between any two

modules, regardless of system or user level

• run any piece of software, both system and user level, in a secure

sandbox with clear security rules

• behavior of any module is compared to the predefined scenario

• guaranteed impossibility of run undeclared behavior

1 2 3 PAGE 16 |

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Secure OS

Principles of OS architecture

1 2 3 PAGE 17 |

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Trusted filtration system prototype

Tru

ste

d z

one

1 2 3 PAGE 18 |

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Trusted filtration system prototype features

Main purpose: to check if technological process remains in

the boundaries of predefined behavior

• means for describe correct technological process

• logical devices with properties and limitations

• device grouping with limitations on the every level

• mapping the limits of technological process to the control

information streams

• track the event chains

• customizable system of alerts and notifications

1 2 3 PAGE 19 |

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Trusted filtration system prototype

Tru

ste

d z

on

e

Tru

ste

d z

one

Trusted zone

Tru

ste

d z

one

Tru

ste

d z

one

1 2 3 PAGE 20 |

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Gradient colors

14

149

115

0

121

91

13

137

105

R

G

B

Diagrams

142

230

0

127

205

0

137

222

0

R

G

B

242

174

107

255

131

0

240

161

82

R

G

B

166

166

166

140

140

140

159

159

159

R

G

B

207

19

149

177

18

128

202

20

146

R

G

B

1

152

255

0

137

230

0

122

201

R

G

B

0

63

137

0

59

130

0

44

95

R

G

B

103

66

148

87

55

125

75

48

108

R

G

B

241

93

104

237

41

57

238

68

80

R

G

B

164

208

197

45

136

113

0

109

85

0

93

69

R

G

B

Tables

0

130

102

0

109

85

R

G

B

230

234

232

201

213

207

182

197

190

171

188

179

R

G

B

220

22

64

195

19

57

183

18

52

R

G

B

Competitors

254

208

106

253

182

17

228

158

2

R

G

B

Thank you!

[email protected]

Questions ?